hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

factoring 12m^2n^2-8mn+1=
Consider the following system of equations. y = 2x - 2 y - 2x = 5 What can you conclude about the system of equations? The system of equations is inconsistent.
Question: 35/8 ( write as mixed number ) Please help me very very quickly!!!!!!!!!!!!!!!!!!!
A construction contractor is purchasing granite tiles for a new kitchen floor. Each tile costs $5 and he wants to spend less than $1,500. The size of each tile
One-half of a number is -12. Find the solution ???
At the school carnival, Carmen sold 3 times as many hot dogs as Shawn. The two of them sold 152 hot dogs altogether. How many hot dogs did Carmen sell? 51382111
. What are three factors that could contribute to a source not being credible?
distribute (x+1)(x-2)
Any number that is divisible by 3 is also divisible by 9.Find a counterexample to show that the conjecture is false.18274548
A transformer has a primary coil with 600 turns and a secondary coil with 300 turns. If the output voltage is 320 volts, what is the input voltage?A. 8 volts